Author of the publication

Exploiting MQTT-SN for Distributed Reflection Denial-of-Service Attacks.

, , and . DEXA Workshops, volume 1285 of Communications in Computer and Information Science, page 74-81. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Software Modeling: A Data-driven Paradigm for Software Analysis., , , and . CoRR, (2019)Economic Perspectives in Test Automation: Balancing Automated and Manual Testing with Opportunity Cost., and . AST, page 85-91. ACM, (2006)The impact of product development on the lifecycle of defects.. DEFECTS, page 21-25. ACM, (2008)A Study of Tool Support for the Evaluation of Programming Exercises., , and . EUROCAST, volume 4739 of Lecture Notes in Computer Science, page 376-383. Springer, (2007)A Process for Risk-Based Test Strategy Development and Its Industrial Evaluation., and . PROFES, volume 9459 of Lecture Notes in Computer Science, page 355-371. Springer, (2015)Lessons learned from making the transition to model-based GUI testing., , and . A-TEST@ESEC/SIGSOFT FSE, page 22-27. ACM, (2019)Using Rule Mining for Automatic Test Oracle Generation., , , and . QuASoQ@APSEC, volume 2767 of CEUR Workshop Proceedings, page 21-28. CEUR-WS.org, (2020)Requirements for Anomaly Detection Techniques for Microservices., , , , and . PROFES, volume 13709 of Lecture Notes in Computer Science, page 37-52. Springer, (2022)Exploring Expectations About Risk-Based Testing: Towards Increasing Effectiveness and Efficiency., and . PROFES, volume 10027 of Lecture Notes in Computer Science, page 683-688. (2016)Towards Information Management Support in Test and Piloting of Complex Mechatronic Systems: An Industry Case Study., , , and . ERP Future, volume 285 of Lecture Notes in Business Information Processing, page 69-76. (2016)